Hybrid Deep Learning Approach for Predictive Maintenance of Industrial Machinery using Convolutional LSTM Networks
Research Paper | Journal Paper
Vol.12 , Issue.4 , pp.1-11, Apr-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i4.111
Abstract
Predictive maintenance is crucial for minimizing unplanned downtime in industrial machinery. This research proposes a hybrid deep learning approach using Convolutional LSTM Networks (Conv-LSTM) for fault detection in wind turbine gearboxes. The Conv-LSTM model combines convolutional neural networks (CNNs) for spatial feature extraction and long short-term memory (LSTM) networks for temporal modeling, enabling it to capture intricate patterns in multivariate sensor data. The approach was evaluated on the AI4I Predictive Maintenance dataset from Kaggle, containing real-world sensor readings from an operational wind turbine gearbox. The Conv-LSTM architecture processes raw sensor data through convolutional and LSTM layers trained jointly to learn hierarchical representations of the gearbox dynamics. Extensive experiments demonstrated the model`s outstanding performance, achieving an impressive 97.9% accuracy in classifying whether a fault condition exists in the gearbox and a corresponding loss of 0.0059 after ten epochs of training. This high predictive accuracy allows wind farm operators to anticipate potential gearbox failures proactively, enabling timely maintenance and minimizing costly downtime. The proposed approach contributes to the efficiency and sustainability of wind energy operations.
Key-Words / Index Term
Predictive Maintenance, Convolutional Neural Network, Long Short-Term Memory, Engine Failure, Industrial Machinery, Sensor Data
References
[1] M. Pech, J. Vrchota, and J. Bedná?, "Predictive maintenance and intelligent sensors in the smart factory: a review," Sensors, Vol.21, No.4, pp.14-70, 2021. doi: 10.3390/s21041470.
[2] M. Hoffmann, S. Wildermuth, R. Gitzel, A. Boyaci, J. Gebhardt, H. Kaule, et al., "Integration of novel sensors and machine learning for predictive maintenance in medium voltage switchgear to enable the energy and mobility revolutions," Sensors, Vol.20, No.7, pp.20-99, 2020. doi: 10.3390/s20072099.
[3] N. Davari, B. Veloso, G. Costa, P. Pereira, R. Ribeiro, and J. Gama, "A survey on data-driven predictive maintenance for the railway industry," Sensors, Vol.21, No.17, pp.5739, 2021. doi: 10.3390/s21175739.
[4] Z. Huang, Y. Shen, J. Li, M. Fey, and C. Brecher, "A survey on ai-driven digital twins in industry 4.0: smart manufacturing and advanced robotics," Sensors, Vol.21, No.19, pp.6340, 2021. doi: 10.3390/s21196340.
[5] M. Dangana, S. Ansari, Q. Abbasi, and S. Hussain, "Suitability of nb-iot for the indoor industrial environment: a survey and insights," Sensors, Vol.21, No.16, pp.52-84, 2021. doi: 10.3390/s21165284.
[6] J. Olesen and H. Shaker, "Predictive maintenance for pump systems and thermal power plants: state-of-the-art review, trends and challenges," Sensors, Vol.20, No.8, pp.24-25, 2020. doi: 10.3390/s20082425.
[7] D. Duncker, W. Ding, S. Etheridge, P. Noseworthy, C. Veltmann, X. Yao, et al., "Smart wearables for cardiac monitoring—real-world use beyond atrial fibrillation," Sensors, Vol.21, No.7, pp.25-39, 2021. doi: 10.3390/s21072539.
[8] G. Callebaut, J. Mulders, G. Ottoy, L. Strycker, and L. Perre, "The art of designing remote IoT devices—technologies and strategies for a long battery life," Sensors, Vol.21, No.3, pp.9-13, 2021. doi: 10.3390/s21030913.
[9] G. Famitafreshi, M. Afaqui, and J. Melià-Seguí, "A comprehensive review on energy harvesting integration in iot systems from Mac layer perspective: challenges and opportunities," Sensors, Vol.21, No.9, pp.30-97, 2021. doi: 10.3390/s21093097.
[10] M. Grilli, D. Valerini, A. Slobozeanu, B. Postolnyi, S. Baloš, A. Rizzo, et al., "Critical raw materials saving by protective coatings under extreme conditions: a review of last trends in alloys and coatings for aerospace engine applications," Materials, Vol.14, No.7, pp.16-56, 2021. doi: 10.3390/ma14071656.
[11] S. Hamdan, M. Ayyash, and S. Almajali, "Edge-computing architectures for Internet of things applications: a survey,"
[12] M. Marchi, M. Penasa, A. Zidi, and C. Manuelian, "Invited review: Use of infrared technologies for the assessment of dairy products—Applications and perspectives," Journal of Dairy Science, Vol.101, No.12, pp.10589-10604, 2018, doi: 10.3168/jds.2018-15202.
[13] M. Paolanti, L. Romeo, A. Felicetti, A. Mancini, E. Frontoni, and J. Loncarski, "Machine Learning Approach for Predictive Maintenance in Industry 4.0," in 2018 14th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA), pp.1-6, 2018. doi: 10.1109/MESA.2018.8449150.
[14] K. I. Masani, P. Oza, and S. Agrawal, "Predictive maintenance and monitoring of industrial machine using machine learning," Scalable Computing: Practice and Experience, Vol.20, No.4, pp.663-668, 2019.
[15] Y. Zhang, B. Xie, T. Chen, and L. Chen, "A deep learning framework for unsupervised anomaly detection in large-scale industrial data," IEEE Transactions on Industrial Informatics, Vol.15, No.8, pp.4620-4629, 2019.
[16] A.Goyal, N. Mahajan, and R. Jha, "Anomaly detection in industrial IoT: A survey," IEEE Communications Surveys & Tutorials, Vol.20, No.3, pp.2523-2553, 2018.
[17] Y. Xu, Y. Zeng, and X. Xu, "Anomaly detection in industrial time series: A survey," IEEE Transactions on Big Data, Vol.4, No.3, pp.372-389, 2018.
[18] M. Himmelspach, B. Knapp, M. Schmitt, and C. Becker, "A hybrid approach to anomaly detection in industrial systems," Journal of Intelligent Manufacturing, Vol.29, No.2, pp.429-439, 2018.
[19] R.Gopalan, V. Rajagopal, and V. Venkatasubramanian, "Anomaly detection in industrial systems using randomized matrix decompositions," IEEE Transactions on Industrial Electronics, Vol.66, No.3, pp.217-225, 2019.
[20] Y. Liu, H. Liu, L. Zhou, and J. Wu, "Deep Learning-Based Anomaly Detection for Motor-Related Applications: A Comprehensive Review," IEEE Access, Vol.9, pp.120616-120631, 2021.
[21] M. H. Yousaf, M. Faheem, N. Islam, M. Ali, and S. W. Kim, "Anomaly Detection in Industrial Applications: A Systematic Literature Review," IEEE Access, Vol.8, pp.86944-86968, 2020.
[22] M. Safdari, P. Jokar, and A. Ahmadi, "Anomaly detection in industrial processes with LSTM networks and deep autoencoders," Journal of Ambient Intelligence and Humanized Computing, Vol.11, No.10, pp.4519-4534, 2020.
[23] R. Gopalan, V. Rajagopal, and V. Venkatasubramanian, "Anomaly detection in industrial systems using randomized matrix decompositions," IEEE Transactions on Industrial Electronics, Vol.66, No.3, pp.217-225, 2019.
[24] Y. Jiang, Y. Han, L. Zhao, H. Liu, and B. Xu, "A Deep Learning Framework for Anomaly Detection in Industrial Internet of Things (IoT)," IEEE Transactions on Industrial Informatics, Vol.15, No.8, pp.4693-4701, 2019.
[25] F. Yuan, J. Zhu, and X. Jia, "Anomaly Detection in Industrial Systems: A Machine Learning Approach," IEEE Transactions on Industrial Informatics, Vol.14, no.8, pp.3667-3674, 2018.
[26] F. M. Bianchi and A. M. K. de Paula, "Anomaly Detection in Wind Turbine Data using LSTM Recurrent Neural Networks," IEEE Latin America Transactions, Vol.19, No.4, pp.567-573, 2021.
[27] C. Zhang, D. Zhou, M. Yang, A.H. Gandomi, A.C. Ammari, and B. Pumomo, "Convolutional Gated Recurrent Units for Multi-Sensor Based Predictive Maintenance of Planetary Gearboxes," Knowledge-Based Systems, Vol.220, 2022. doi: 10.1016/j.knosys.2021.107442.
[28] F. Jiang, Y. Pang, Q. Yang, Y. Wang, and Z. Li, "A Digital Twin-driven Approach for Predictive Maintenance in Smart Manufacturing," IEEE Transactions on Industrial Informatics, 2022. doi: 10.1109/TII.2022.3185517.
[29] A.Soualhi, G. Clerc, H. Razik, and A. Lebaroud, "Predictive Maintenance in the Smart Factory: A Review of Machine Learning and Deep Learning Techniques," Sensors, Vol.22, No.6, 2022. doi: 10.3390/s22062096.
[30] S. Wang, F. Zhang, X. Zhang, Y. Liu, and J. Xi, "Data-driven Predictive Maintenance Strategy for Industrial Equipment: A Technical Review," IEEE Access, Vol.10, pp.17801-17820, 2022. doi: 10.1109/ACCESS.2022.3152872.
Citation
M.T. Stow, "Hybrid Deep Learning Approach for Predictive Maintenance of Industrial Machinery using Convolutional LSTM Networks," International Journal of Computer Sciences and Engineering, Vol.12, Issue.4, pp.1-11, 2024.
An Enhanced Intrusion Detection System Using Edge Centric Approach
Research Paper | Journal Paper
Vol.12 , Issue.4 , pp.12-16, Apr-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i4.1216
Abstract
In the ever-evolving landscape of Cybersecurity, the detection and mitigation of network intrusions and anomalous activities remain formidable challenges. Conventional methods for identifying threats often encounter difficulties in scaling up and adapting swiftly, as they heavily rely on labeled network data. Furthermore, a narrow focus on individual data points may inadvertently overlook critical details at the packet level, thus exposing vulnerabilities that malicious actors can exploit. To confront these ongoing challenges head-on, Graph Neural Networks (GNNs) emerge as a promising solution. Their innate ability to comprehend complex network structures equips them with the capability to provide deeper insights into the dynamics of network traffic. By harnessing the power of GNN, it autonomously detects and comprehends intrusions and anomalies, surpassing the limitations of conventional techniques. Through experimentation and evaluation on real-world datasets, the proposed system demonstrates promising results in accurately identifying and classifying network intrusions.
Key-Words / Index Term
Cyber Security, Network intrusions, Graph Neural Networks (GNN), Packet level analysis, Performance metrics, Effectiveness Evaluation, Bot-Iot.
References
[1] A. R. Mathew, A. Al Hajj and K. Al Ruqeishi, "Cyber crimes: Threats and protection," 2010 International Conference on Networking and Information Technology, Manila, Philippines, pp.16-18, 2010. doi: 10.1109/ICNIT.2010.5508568.
[2] N. Aggarwal, M. Sehgal and A. Arya, "An empirical analysis of Cyber Crimes, their prevention measures, and laws in India," 2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC), Solan, Himachal Pradesh, India, pp.570-575, 2022. doi: 10.1109/PDGC56933.2022.10053354.
[3] Anupreet Kaur Mokha. A Study on Awareness of Cyber Crime and Security. Research J. Humanities and Social Sciences. October -December, Vol.8, Issue.4, pp.459-464, 2017. doi: 10.5958/2321-5828.2017.00067.5
[4] S. Angra and S. Ahuja, "Machine learning and its applications: A review," 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC), Chirala, Andhra Pradesh, India, pp.57-60, 2017. doi: 10.1109/ICBDACI.2017.8070809.
[5] D. Kataria et al., "Artificial Intelligence And Machine Learning," 2022 IEEE Future Networks World Forum (FNWF), Montreal, QC, Canada, pp.1-70, 2022. doi: 10.1109/FNWF55208.2022.00133.
[6] M. Gorricho-Segura, X. Echeberria-Barrio and L. Segurola-Gil, "Edge-based Analysis for Network Intrusion Detection using a GNN Approach," 2023 JNIC Cybersecurity Conference (JNIC), Vigo, Spain, pp.1-7, 2023. doi: 10.23919/JNIC58574.2023.10205384.
[7] L. Zeng, C. Yang, P. Huang, Z. Zhou, S. Yu and X. Chen, "GNN at the Edge: Cost-Efficient Graph Neural Network Processing Over Distributed Edge Servers," in IEEE Journal on Selected Areas in Communications, March, Vol.41, No.3, pp.720-739, 2023. doi: 10.1109/JSAC.2022.3229422.
[8] F. Scarselli, M. Gori, A. C. Tsoi, M. Hagenbuchner and G. Monfardini, "The Graph Neural Network Model," in IEEE Transactions on Neural Networks, Jan., Vol.20, No.1, pp.61-80, 2009. doi: 10.1109/TNN.2008.2005605.
[9] M. Schneider, J. Weißenbach and U. Schmid, "Substrate Temperature and Bias Voltage Dependent Properties of Sputtered AlN Thin Films for BAW Applications," 2018 IEEE 18th International Conference on Nanotechnology (IEEE-NANO), Cork, Ireland, pp.420-425, 2018. doi: 10.1109/NANO.2018.8626332.
[10] Ankita Sharma, “Review on Major Cyber security Issues in Educational Sector,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.12, pp.26-29, 2021.
Citation
Bhavya Lahari Vaddempudi, Amrutha Tulabandu, S.N.B. Tanuja Reddy, Deepika Leela Pudi, Venkata Narayana Yerininti, "An Enhanced Intrusion Detection System Using Edge Centric Approach," International Journal of Computer Sciences and Engineering, Vol.12, Issue.4, pp.12-16, 2024.